CS110 2
CS110 2
To Computing
Module 2: Computer
Hardware (Evaluating
Hardware: For Home and
Work)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May
Reserved.
not be scanned,
May not
copied
be scanned,
or duplicated,
copied or
or posted
duplicated,
to a publicly
or postedaccessible
to a publicly
website,
accessible
in whole
website,
or in part.
in whole or in part. 1
Module Objectives
By the end of this module, you should be able to:
• Explain considerations when purchasing technology devices
• Describe the characteristics and uses of input and output devices
• Evaluate hardware
• Prevent and troubleshoot hardware theft or failure
• Distinguish among internal, external, and cloud-based storage
• Describe network hardware
• Explain the uses of cases, motherboard components, system clock, processor
cooling, the arithmetic logic unit, the machine cycle, and registers
• Discuss ways to prevent health-related injuries and disorders caused by technology
use
• Identify responsible e-waste and technology disposal techniques
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 2
Considering Computer Operating Systems
(1 of 6)
• Hardware refers to the device itself and its components, such as
wires, cases, switches, and electronic circuits.
• Components of computer hardware contain various types of
hardware:
✔ Memory
✔ Storage devices
✔ CPU
✔ Input and output devices
✔ Communication devices
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 3
Considering Computer Operating Systems
(2 of 6)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 5
Considering Computer Operating Systems
(4 of 6)
RAM ROM
• It is the temporary storage location. • It is the permanent storage location.
• It is stored on one or more chips • It is stored on a chip that contains
connected to the main circuit board of BIOS connected to the main circuit
the computer (the motherboard). board of the computer (the
motherboard).
• It is volatile memory.
• It is non-volatile memory.
• The motherboard is a circuit board
inside a computer that contains the • Computer manufacturers update the
microprocessor, the computer memory, instructions on the ROM chip, which
and other internal devices. are referred to as firmware.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 6
Considering Computer Operating Systems
(5 of 6)
Table 3-1 Types of RAM.
Type of RAM Description Volatile or Nonvolatile
Dynamic RAM (DRAM) Memory needs to be constantly recharged or Volatile
contents will be erased.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 7
Considering Computer Operating Systems
(6 of 6)
Table 3-2 Factors to consider in buying a computer.
Consideration Questions
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 8
Which Type of Computer Is Right For You?
(1 of 2)
Table 3-3 Evaluating system requirements.
Specification Recommended Solution
Different processor Identify the program or app with the greater processor requirement and select a
requirements computer with a processor that meets or exceeds the requirement.
Different memory Identify the program or app with the greater memory requirement and select a
requirements computer with a memory type and capacity that meets or exceeds this requirement.
Computers with as little as 4 GB of memory are great for basic web browsing and very
basic productivity tasks, while computers with as much as 32 GB are often used for
virtual reality applications, high-end gaming, and other intensive tasks.
Different storage Add the storage requirements for each program or app you want to use, and select a
requirements computer with a storage capacity that exceeds the sum of all storage requirements.
Other differing In most cases, identify the program or app with the greater requirement and select a
hardware computer that at least meets or exceeds this requirement.
requirements
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 9
Which Type of Computer Is Right For You?
(2 of 2)
• The form factor refers to the shape and size of the computer.
• Various types of computers exist, including desktop computers, all-
in-one computers, laptops, tablets, and other mobile devices.
• A desktop computer typically consists of the system unit, monitor,
keyboard, and mouse which remain in a stationary location under a
desk or table.
• An all-in-one computer has a monitor and system unit housed
together.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 10
Selecting The Right Device (1 of 2)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 11
Selecting The Right Device (2 of 2)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 13
Input and Output Devices (2 of 3)
Table 3-4 Types of printers.
Type of Printer Description
Multifunction device Also called an all-in-one printer; can serve as an input device by copying and scanning
as well as an output device by faxing and printing
Mobile printer Small, lightweight printer that is built into or attached to a mobile device for mobile
printing
Plotter Large-format printer that uses charged wires to produce high-quality drawings for
professional applications such as architectural blueprints; plotters draw continuous
lines on large rolls of paper
3–D printer Creates objects based on computer models using special plastics and other materials
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 14
Input and Output Devices (3 of 3)
• Computers can also provide voice output. A
voice synthesizer converts text to speech.
• Some apps and operating systems have a
built-in voice synthesizer.
• It is convenient for some and helpful for
those with visual impairments.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 17
Install and Evaluate Hardware (3 of 3)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 18
Secure IT: Reducing Hardware Risks
(1 of 5)
Avoid Hardware Theft
• Known for their mobility, devices can
be stolen
• Keep data accessible in case of theft
or destruction of the device
• To prevent laptops from being stolen,
use a cable lock.
• Keep mobile devices out of sight when
traveling in a high-crime area.
• Minimize the use of headphones and
be aware of your surroundings.
Figure 3-22 Laptop cable lock.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 19
Secure IT: Reducing Hardware Risks
(2 of 5)
• Use a damp cloth to clean the screen gently.
• Use a can of compressed air to clean the
keyboard of any dirt and debris.
• Extreme temperatures or humidity can damage
electronics.
• An uninterruptible power supply is a device that
maintains power to computer equipment in the
event of an interruption in the primary electrical
source.
• A surge suppressor is a device that prevents
power fluctuations from damaging electronic Figure 3-23 Uninterruptible power
components. supply.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 20
Secure IT: Reducing Hardware Risks
(3 of 5)
Protecting a computer from a cyber attack is important, but its damage
by dropping it or by a lightning strike is also of prime importance.
Table 3-5 Electrical changes.
Electrical Explanation
Change
Blackout Total loss of power
Brownout Drop in voltage lasting minutes or hours
Spike Very short duration of voltage increase
Surge Short duration of voltage increase
Noise Unwanted high-frequency energy
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 21
Secure IT: Reducing Hardware Risks
(4 of 5)
• Restoring an operating system means
reverting all settings to their default or
migrating back to the operating system’s
previous version.
• To restore the operating system, review
the help documentation and follow the
specified steps.
• Data backups can protect against
hardware malfunctions, user errors,
software corruption, and natural
disasters.
• They can also protect against cyber Figure 3-24 Windows includes a feature to
attacks. restore your operating system.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 22
Secure IT: Reducing Hardware Risks
(5 of 5)
• The central connection devices for a
home-based Wi-Fi network are called
wireless routers.
• Wi-Fi networks are vulnerable to several
risks, such as:
Reading wireless transmissions
Viewing or stealing computer data
Injecting malware
Downloading harmful content Figure 3-25 Wireless router.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 23
Internal, External, and Cloud-Based
Storage Solutions (1 of 3)
• When using a computer, the most common
storage medium is the internal hard drive
and can either store data magnetically or
use solid state storage.
• Internal hard drives are installed on the
computer you are using.
• An external hard drive can add storage
capacity to your computer.
• Magnetic hard disk drives (HDDs) typically
have greater storage capacity.
• A solid-state drive (SSD) is faster and more Figure 3-26 Hard disk drive.
durable than magnetic drives.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 24
Internal, External, and Cloud-Based
Storage Solutions (2 of 3)
• Optical media use laser technology for storage and playback and
include CDs, DVDs, and Blu-ray discs.
• Optical media were once widely used to distribute installation files
for programs and apps, but saving files to optical media requires
special software or capabilities within the operating system.
• Instead of optical discs, USB flash drives, external hard drives, and
cloud storage are now more commonly used to transport files.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 25
Internal, External, and Cloud-Based
Storage Solutions (3 of 3)
• Cloud storage involves storing electronic
files on a remote server connected to the
Internet, not on a local computer, and is
called storing data on the cloud.
• It enables the storage of files remotely on
servers that could be any part of the world.
• Storing files on and retrieving files from
cloud storage requires only a computer or
mobile device with an Internet connection.
• Cloud storage companies host and maintain
the servers and provide access to your
files. Figure 3-28 Cloud storage.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 26
Network Hardware (1 of 3)
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 27
Network Hardware (2 of 3)
• Devices on a network, also called nodes, include computers, tablets, mobile phones,
printers, game consoles, and smart home devices.
• Most networks also include additional components, such as hubs, switches, and
routers.
• A hub is a device that provides a central point for cables in a network and transfers
all data to all devices.
• A switch is similar to a hub in that it provides a central point for cables in a
network.
• A router is a device that connects two or more networks and directs, or routes, the
flow of information along the networks.
• A modem is a communications device that connects a communications channel,
such as the Internet, to a sending or receiving device, such as a computer.
• For a computer to connect to a network, it should have a network interface card.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 28
Network Hardware (3 of 3)
• Most of today’s modems are digital, which
means that they send and receive data to
and from a digital line.
• Cable and DSL (digital subscriber line) are
two common types of digital modems.
• The type of modem required for your
network will depend on your Internet
service provider.
• A cable modem sends and receives digital
data over a cable TV connection.
• A DSL modem uses existing standard
copper telephone wiring to send and Figure 3-29 Modems can connect many
receive digital data. devices to the Internet.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 29
Inside the Case (1 of 5)
• Processor chips for laptops, desktops, and servers can generate quite
a bit of heat, which could cause the chip to malfunction or fail.
• Heat sinks, liquid cooling technologies, and cooling pads are used to
help further dissipate processor heat.
• A heat sink is a small ceramic or metal component with fins on its
surface that absorbs and disperses heat produced.
• Liquid cooling technology uses a continuous flow of fluid, such as
water and glycol, in a process that transfers the heated fluid away.
• A cooling pad rests below a laptop and protects the computer from
overheating.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 30
Inside the Case (2 of 5)
• RSI impacts your muscles, nerves, tendons, and ligaments. RSI most often
affects the upper parts of the body, including elbows, forearms, hands, neck,
shoulders, and wrists
• RSI has a variety of symptoms:
✔ Aching ✔ Tenderness
✔ Cramp ✔ Throbbing
✔ Numbness
✔ Tingling
✔ Pain ✔ Weakness
✔ Stiffness
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 35
How To: Protect Yourself When Using
Devices (1 of 4)
RSI most often is caused by three factors:
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 36
How To: Protect Yourself When Using
Devices (2 of 4)
Ergonomics is an applied science
that specifies the design and
arrangement of items that you use
so that you and the items interact
efficiently and safely.
This shows the correct ergonomic
posture and techniques for sitting
while working on a computer.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 37
How To: Protect Yourself When Using
Devices (3 of 4)
• One behavioral hazard is technology addiction, which occurs when a user is
obsessed with using a technology device.
• Apart from technology addiction, other behavioral risks are:
✔ Sedentary lifestyle
✔ Psychological development
✔ Social interaction
• One negative impact that can result in serious emotional harm is cyber-bullying.
• Doxing is a form of cyber-bullying in which documents (dox) are shared digitally
that give private or personal information about a person.
• Cyber-stalking involves the use of technology to stalk another person through
email, text messages, phone calls, and other forms of communication.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 38
How To: Protect Yourself When Using
Devices (4 of 4)
Table 3-7 Harmful features of cyberbullying.
Feature Bullying Cyberbullying
Seems to never end A child may be bullied at school, Because cyberbullying comments
but once the child goes home the posted online are visible all the time to
bullying ceases. the victim the bullying never ends.
Everyone knows about Mean-spirited words spoken to a A cyberbully can post comments online
it victim may be heard only by that can be read by everyone.
those who are nearby.
May follow for a Bullying usually stops when the Posted cyberbullying comments may
lifetime person or victim leaves. remain visible online for years and
even follow the victim through life,
impacting college admissions and
employment.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 39
Ethics and Issues: Dispose of Hardware
Responsibly (1 of 2)
• E-waste is electronic waste from
discarded digital devices.
• It often contains toxic metals, like lead
and mercury which contaminate the
ground and water supply, causing harm to
the environment.
• Three responsible methods for disposing
of e-waste:
Send it to a recycling facility
Donate it to a charity or other nonprofit
organization Figure 3-35 Electronic recycling center.
Bring it to a technology store or firm
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 40
Ethics and Issues: Dispose of Hardware
Responsibly (2 of 2)
An initiative called Sustainable Electronics Management (SEM)
promotes the reduction of e-waste.
Table 3-8 SEM action steps.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 41